CN109861999B - Data transmission control method, device and storage medium - Google Patents

Data transmission control method, device and storage medium Download PDF

Info

Publication number
CN109861999B
CN109861999B CN201910055906.6A CN201910055906A CN109861999B CN 109861999 B CN109861999 B CN 109861999B CN 201910055906 A CN201910055906 A CN 201910055906A CN 109861999 B CN109861999 B CN 109861999B
Authority
CN
China
Prior art keywords
terminal
target data
password information
sent
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910055906.6A
Other languages
Chinese (zh)
Other versions
CN109861999A (en
Inventor
沈东�
胡春梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ganwei Software Technology Co ltd
Original Assignee
Shenzhen Ganwei Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ganwei Software Technology Co ltd filed Critical Shenzhen Ganwei Software Technology Co ltd
Priority to CN201910055906.6A priority Critical patent/CN109861999B/en
Publication of CN109861999A publication Critical patent/CN109861999A/en
Application granted granted Critical
Publication of CN109861999B publication Critical patent/CN109861999B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a control method of data transmission, which comprises the following steps: the first terminal sends target data to the second terminal through a user datagram protocol; when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again; and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal. The invention also discloses a control device for data transmission and a computer readable storage medium. The invention improves the reliability of the data transmitted based on the UDP protocol.

Description

Data transmission control method, device and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data transmission control method, a data transmission control device, and a computer-readable storage medium.
Background
The udp (user Datagram protocol) protocol is a user Datagram protocol, is used for processing data packets in a network like a TCP protocol, is a connectionless protocol, belongs to a connectionless transport layer protocol in an OSI (Open System Interconnection) reference model, and provides a transaction-oriented simple unreliable information transfer service.
Because the UDP protocol has the disadvantages of not providing packet grouping and assembling and not being able to sequence packets, when a sending end sends data based on UDP transmission, a receiving end may not receive data due to packet loss, and even if the receiving end receives data, it is difficult to determine whether the data is true or false.
Disclosure of Invention
The main object of the present invention is to provide a method for controlling data transmission, a device for controlling data transmission, and a computer-readable storage medium, which improve the reliability of data transmitted based on the UDP protocol.
In order to achieve the above object, the present invention provides a method for controlling data transmission, including the following steps:
the first terminal sends target data to the second terminal through a user datagram protocol;
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again;
and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal.
Preferably, when the response information corresponding to the target data and sent by the second terminal is not received within the preset time period, the step of resending the target data to the second terminal includes:
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, acquiring the number of times of sending the target data to the second terminal;
and when the number of times of sending the target data to the second terminal is less than a preset number of times, sending the target data to the second terminal again.
Preferably, the target data includes a control instruction, and the control instruction is used for controlling the second terminal to operate.
Preferably, the method for controlling data transmission includes the following steps:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, sending response information and password information corresponding to the target data to the first terminal;
receiving password information sent by the first terminal based on the password information;
and when detecting that the password information corresponds to the password information, judging that the first terminal passes the verification, and processing the target data.
Preferably, after the step of sending, by the second terminal, response information and password information corresponding to the target data to the first terminal when the second terminal receives the target data sent by the first terminal through the user datagram protocol, the method further includes:
and when the password information sent by the first terminal based on the password information is not received within a preset time length, the password information is sent to the first terminal again.
Preferably, when the second terminal receives target data sent by the first terminal through a user datagram protocol, the step of sending response information and password information corresponding to the target data to the first terminal includes:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, generating response information and password information corresponding to the target data;
and sending the response information and the password information to the first terminal.
Preferably, the step of processing the target data comprises:
and acquiring a control instruction in the target data, and executing the control instruction.
In order to achieve the above object, the present invention further provides a control device for data transmission, including:
the data transmission control device comprises a memory, a processor and a data transmission control program which is stored on the memory and can run on the processor, and the data transmission control program realizes the steps of the data transmission control method when being executed by the processor.
To achieve the above object, the present invention further provides a computer-readable storage medium having stored thereon a control program for data transmission, which when executed by a processor implements the steps of the control method for data transmission as described above.
According to the data transmission control method, the data transmission control device and the computer readable storage medium, the first terminal sends target data to the second terminal through a user datagram protocol; when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again; and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal. Thus, the reliability of the data transmitted based on the UDP protocol is improved.
Drawings
Fig. 1 is a schematic diagram of a hardware operating environment of a terminal according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a method for controlling data transmission according to the present invention;
fig. 3 is a flowchart illustrating a control method for data transmission according to a second embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a control method for data transmission, which improves the reliability of data transmitted based on a UDP protocol.
As shown in fig. 1, fig. 1 is a schematic diagram of a hardware operating environment of a terminal according to an embodiment of the present invention;
the terminal in the embodiment of the invention can be a control device for data transmission.
As shown in fig. 1, the terminal may include: a processor 1001, such as a Central Processing Unit (CPU), a memory 1002, and a communication bus 1003. The communication bus 1003 is used for implementing connection communication between the components in the terminal. The memory 1002 may be a random-access memory (RAM-random-access memory) or a non-volatile memory (non-volatile memory), such as a disk memory. The memory 1002 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration of the terminal shown in fig. 1 is not intended to be limiting of the terminal of embodiments of the present invention and may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1002, which is a kind of computer storage medium, may include therein a control program for data transmission.
In the terminal shown in fig. 1, the processor 1001 may be configured to call up a control program for data transmission stored in the memory 1002, and perform the following operations:
the first terminal sends target data to the second terminal through a user datagram protocol;
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again;
and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, acquiring the number of times of sending the target data to the second terminal;
and when the number of times of sending the target data to the second terminal is less than a preset number of times, sending the target data to the second terminal again.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
the target data comprises a control instruction, and the control instruction is used for controlling the second terminal to operate.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, sending response information and password information corresponding to the target data to the first terminal;
receiving password information sent by the first terminal based on the password information;
and when detecting that the password information corresponds to the password information, judging that the first terminal passes the verification, and processing the target data.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
and when the password information sent by the first terminal based on the password information is not received within a preset time length, the password information is sent to the first terminal again.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, generating response information and password information corresponding to the target data;
and sending the response information and the password information to the first terminal.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
and acquiring a control instruction in the target data, and executing the control instruction.
Referring to fig. 2, in an embodiment, the method for controlling data transmission includes:
and step S10, the first terminal sends the target data to the second terminal through the user datagram protocol.
In this embodiment, the terminal in this embodiment is a first terminal, and the first terminal may be a control device for data transmission, such as a mobile phone, a tablet, a computer, and the like. In addition, the second terminal may be a control device for data transmission, such as a mobile phone, a tablet device, a computer, or a home appliance.
The first terminal is a sending end for UDP (user Datagram protocol) transmission, and the second terminal is a receiving end for UDP transmission, that is, the first terminal may send data to the second terminal through a UDP protocol.
Alternatively, the target data may be data transmitted by the first terminal to the second terminal through a user datagram protocol. Wherein the target data may include a control instruction for controlling the operation of the second terminal.
Specifically, the first terminal sends the target data to the second terminal in the form of a UDP packet through a UDP protocol.
Step S20, when the response information corresponding to the target data sent by the second terminal is not received within the preset time, resending the target data to the second terminal.
After the first terminal sends the target data to the second terminal through the UDP protocol, the second terminal needs to return a response message corresponding to the target data to the first terminal to inform the first terminal that the target data has been received. And if the first terminal does not receive the response information which is sent by the second terminal and corresponds to the target data within the preset time length, the first terminal sends the target data to the second terminal again through the UDP protocol.
It should be noted that the preset time may be in a range of 1 second to 10 seconds, and preferably 2 seconds, 3 seconds, or 5 seconds.
Therefore, the problem that data transmission between the first terminal and the second terminal cannot be continued due to data packet loss during UDP transmission can be avoided, and the reliability of data transmitted based on the UDP protocol is improved.
Specifically, when the first terminal does not receive response information corresponding to the target data sent by the second terminal within a preset time length, the number of times of sending the target data to the second terminal, that is, the number of times of sending the target data is obtained, and when the number of times of sending the target data is smaller than the preset number of times, the first terminal sends the target data to the second terminal again; and when the sending times of the target data are larger than or equal to the preset times, the first terminal stops sending the target data to the second terminal, namely the first terminal does not send the target data any more.
Therefore, the situation that when the second terminal cannot receive the target data and does not return the response information to the first terminal due to poor network environment and the first terminal continues to repeatedly send the target data because the response information is not received is avoided, and resource waste is caused.
Of course, when the first terminal receives the response information corresponding to the target data returned by the second terminal, the first terminal stops sending the same target data to the second terminal.
Step S30, when receiving password information corresponding to the target data sent by the second terminal, sending password information corresponding to the password information to the second terminal, so that the second terminal can verify the first terminal.
After the second terminal receives the target data sent by the first terminal, the second terminal returns response information to the first terminal to enable the first terminal to stop sending the same target data, and sends password information of the target data to the first terminal to verify the first terminal, so that whether the received target data is credible or not is determined.
It should be noted that the password information is dynamic password information, which may be a same key mechanism built in the first terminal and the second terminal in advance, and the second terminal may dynamically generate the password information after receiving the target data, or randomly generate a password information, and then associate the password information with the target data. It should be appreciated that the password information generated by the second terminal at a time may be the same or different, and thus the risk of the second terminal receiving illegal data may be reduced.
Specifically, after the first terminal receives the password information sent by the second terminal, the password information corresponding to the password information is generated according to the password information, and the password information is sent to the second terminal in a UDP transmission mode.
After the second terminal receives the password information of the first terminal, whether the password information corresponds to the password information or not is detected, and when the password information corresponds to the password information, the verification is judged to be passed; if the password information does not correspond to the password information, the authentication is determined not to be passed.
Optionally, the target data may include a control instruction for controlling the operation of the second terminal. When the first terminal passes the verification, the first terminal is judged to have the control authority, and the second terminal can acquire the control command in the target data and execute the control command.
When the first terminal is not authenticated, the second terminal may not process the target data or may erase the target data.
Therefore, a password authentication mechanism is introduced into interaction between the first terminal and the second terminal based on UDP transmission, and authenticity of data received by the second terminal is ensured by authenticating the authority of the first terminal, so that reliability of data transmitted based on the UDP protocol is improved.
In one embodiment, a first terminal sends target data to a second terminal through a user datagram protocol; when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again; and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal. Thus, the reliability of the data transmitted based on the UDP protocol is improved.
In a second embodiment, as shown in fig. 3, based on the above embodiment shown in fig. 2, the method for controlling data transmission includes the following steps:
and step S40, when the second terminal receives the target data sent by the first terminal through the user datagram protocol, sending response information and password information corresponding to the target data to the first terminal.
And step S50, receiving password information sent by the first terminal based on the password information.
And step S60, when it is detected that the password information corresponds to the password information, determining that the first terminal passes the authentication, and processing the target data.
In this embodiment, the terminal in this embodiment is a second terminal, and the first terminal may be a control device for data transmission, such as a mobile phone, a tablet, a computer, and the like. In addition, the second terminal may be a control device for data transmission, such as a mobile phone, a tablet device, a computer, or a home appliance.
The first terminal may send data to the second terminal via the UDP protocol, and accordingly, the second terminal may also send data to the first terminal via the UDP protocol.
Alternatively, the target data may be data transmitted by the first terminal to the second terminal through a user datagram protocol. Wherein the target data may include a control instruction for controlling the operation of the second terminal. The first terminal may send the target data to the second terminal in the form of UDP packets via the UDP protocol.
After the first terminal sends the target data to the second terminal through the UDP protocol, the second terminal needs to return a response message corresponding to the target data to the first terminal to inform the first terminal that the target data has been received.
Specifically, when the second terminal receives target data sent by the first terminal through the UDP protocol, the second terminal may generate corresponding response information according to the received target data, where the response information is used to inform that the first terminal has received the target data, so that the first terminal stops sending the same target data. Meanwhile, the second terminal can also generate dynamic password information in real time and correlate the password information with the received target data.
It should be noted that, when the second terminal receives different target data sent by the first terminal at the same time, the corresponding response information and password information may still be generated for each target data.
The second terminal can send the response information to the first terminal through a UDP protocol when generating the response information corresponding to the target data, and the second terminal can send the password information to the first terminal through the UDP protocol when generating the password information corresponding to the target data so as to verify the first terminal and further determine whether the received target data is credible.
Optionally, if the second terminal receives the same target data sent by the first terminal after sending the response message to the first terminal, indicating that the first terminal does not receive the response message, the second terminal may send the response message again. Therefore, the situation that the first terminal continues to repeatedly send the target data because the first terminal does not receive the response information due to poor network environment and resource waste is caused is avoided.
When the second terminal does not receive the password information sent by the first terminal based on the password information within the preset time length, the second terminal indicates that the first terminal receives the password information, and therefore the second terminal can send the password information to the first terminal again. It should be noted that the preset time may be in a range of 1 second to 10 seconds, and preferably 2 seconds, 3 seconds, or 5 seconds.
After the second terminal receives the password information of the first terminal, whether the password information corresponds to the password information or not is detected, and when the password information corresponds to the password information, the verification is judged to be passed; if the password information does not correspond to the password information, the authentication is determined not to be passed.
Optionally, the target data may include a control instruction for controlling the operation of the second terminal. When the first terminal passes the verification, the first terminal is judged to have the control authority, and the second terminal can acquire the control command in the target data and execute the control command.
For example, the first terminal may be a mobile phone, the second terminal may be a lighting device, the first terminal may transmit a lighting instruction to the second terminal through a UDP protocol, after the second terminal receives the lighting instruction transmitted based on the UDP protocol, the second terminal returns response information and password information to the first terminal, and when the password information is verified, the second terminal executes the lighting instruction, that is, the lighting device performs a lighting operation.
When the first terminal is not authenticated, the second terminal may not process the target data or may erase the target data.
The UDP protocol is a connectionless transport layer protocol, and the user may conveniently control a corresponding electronic device (the second terminal) by sending a control instruction to the second terminal through the first terminal by using the UDP protocol.
In one embodiment, when a second terminal receives target data sent by a first terminal through a user datagram protocol, response information and password information corresponding to the target data are sent to the first terminal; receiving password information sent by the first terminal based on the password information; and when detecting that the password information corresponds to the password information, judging that the first terminal passes the verification, and processing the target data. Thus, the reliability of the data transmitted based on the UDP protocol is improved.
In addition, the present invention also provides a control device for data transmission, where the control device for data transmission includes a memory, a processor, and a control program for data transmission stored in the memory and executable on the processor, and the processor implements the steps of the control method for data transmission according to the above embodiment when executing the control program for data transmission.
Furthermore, the present invention also proposes a computer-readable storage medium including a control program for data transmission, which when executed by a processor implements the steps of the control method for data transmission as described in the above embodiment.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a television, a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (9)

1. A method for controlling data transmission, the method comprising:
the first terminal sends target data to the second terminal through a user datagram protocol;
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again;
when password information corresponding to the target data and sent by the second terminal is received, password information is generated according to the password information, and the password information corresponding to the password information is sent to the second terminal so that the second terminal can verify the first terminal, wherein the password information sent each time is different.
2. The method according to claim 1, wherein the step of retransmitting the target data to the second terminal when the response message corresponding to the target data sent by the second terminal is not received within a preset time period comprises:
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, acquiring the number of times of sending the target data to the first terminal;
and when the number of times of sending the target data to the second terminal is less than a preset number of times, sending the target data to the second terminal again.
3. The method according to claim 1 or 2, wherein the target data includes a control instruction for controlling the operation of the second terminal.
4. A method for controlling data transmission, the method comprising:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, sending response information and password information corresponding to the target data to the first terminal, wherein the password information sent each time is different;
receiving password information sent by the first terminal based on the password information, wherein the first terminal generates the password information according to the password information;
and when detecting that the password information corresponds to the password information, judging that the first terminal passes the verification, and processing the target data.
5. The method for controlling data transmission according to claim 4, wherein after the step of sending response information and password information corresponding to the target data to the first terminal when the second terminal receives the target data sent by the first terminal through the user datagram protocol, the method further comprises:
and when the password information sent by the first terminal based on the password information is not received within a preset time length, the password information is sent to the first terminal again.
6. The method for controlling data transmission according to claim 4, wherein the step of sending response information and password information corresponding to the target data to the first terminal when the second terminal receives the target data sent by the first terminal through the user datagram protocol comprises:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, generating response information and password information corresponding to the target data;
and sending the response information and the password information to the first terminal.
7. The method for controlling data transmission according to claim 4, wherein the step of processing the target data includes:
and acquiring a control instruction in the target data, and executing the control instruction.
8. A data transfer control apparatus comprising a memory, a processor, and a data transfer control program stored in the memory and executable on the processor, wherein the data transfer control program, when executed by the processor, implements the steps of the data transfer control method according to any one of claims 1 to 7.
9. A computer-readable storage medium, characterized in that a control program of data transmission is stored on the computer-readable storage medium, which when executed by a processor implements the steps of the control method of data transmission according to any one of claims 1 to 7.
CN201910055906.6A 2019-01-21 2019-01-21 Data transmission control method, device and storage medium Active CN109861999B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910055906.6A CN109861999B (en) 2019-01-21 2019-01-21 Data transmission control method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910055906.6A CN109861999B (en) 2019-01-21 2019-01-21 Data transmission control method, device and storage medium

Publications (2)

Publication Number Publication Date
CN109861999A CN109861999A (en) 2019-06-07
CN109861999B true CN109861999B (en) 2022-04-26

Family

ID=66895511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910055906.6A Active CN109861999B (en) 2019-01-21 2019-01-21 Data transmission control method, device and storage medium

Country Status (1)

Country Link
CN (1) CN109861999B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110647071B (en) * 2019-09-05 2021-08-27 华为技术有限公司 Method, device and storage medium for controlling data transmission
CN112217610B (en) * 2020-09-18 2023-03-14 广州市贺氏办公设备有限公司 Data processing method and device, consumer machine, terminal and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699797A (en) * 2009-11-13 2010-04-28 珠海网博信息科技有限公司 Method for performing data transmission by using UDP protocol
CN102752311A (en) * 2012-07-16 2012-10-24 天地融科技股份有限公司 Authentication method, system and device
CN102916968A (en) * 2012-10-29 2013-02-06 北京天诚盛业科技有限公司 Identity authentication method, identity authentication server and identity authentication device
CN103685103A (en) * 2013-11-26 2014-03-26 广州市花都区中山大学国光电子与通信研究院 Integral verification platform based on FPGA communication base bands
CN105792269A (en) * 2016-02-25 2016-07-20 深圳市共进电子股份有限公司 Remote operation and maintenance management method and device based on UDP (User Datagram Protocol) connection
CN107608224A (en) * 2017-09-18 2018-01-19 广东美的制冷设备有限公司 Control method, device and the computer-readable recording medium of household electrical appliances

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015161693A1 (en) * 2014-04-25 2015-10-29 天地融科技股份有限公司 Secure data interaction method and system
CN107707439A (en) * 2017-09-29 2018-02-16 深圳市艾特智能科技有限公司 Control method, system, storage medium and the computer equipment of intelligent home device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699797A (en) * 2009-11-13 2010-04-28 珠海网博信息科技有限公司 Method for performing data transmission by using UDP protocol
CN102752311A (en) * 2012-07-16 2012-10-24 天地融科技股份有限公司 Authentication method, system and device
CN102916968A (en) * 2012-10-29 2013-02-06 北京天诚盛业科技有限公司 Identity authentication method, identity authentication server and identity authentication device
CN103685103A (en) * 2013-11-26 2014-03-26 广州市花都区中山大学国光电子与通信研究院 Integral verification platform based on FPGA communication base bands
CN105792269A (en) * 2016-02-25 2016-07-20 深圳市共进电子股份有限公司 Remote operation and maintenance management method and device based on UDP (User Datagram Protocol) connection
CN107608224A (en) * 2017-09-18 2018-01-19 广东美的制冷设备有限公司 Control method, device and the computer-readable recording medium of household electrical appliances

Also Published As

Publication number Publication date
CN109861999A (en) 2019-06-07

Similar Documents

Publication Publication Date Title
CN109246053B (en) Data communication method, device, equipment and storage medium
EP3013086B1 (en) Method, apparatus and electronic device for connection management
CN109309685B (en) Information transmission method and device
CN107241336B (en) Identity verification method and device
EP3319267A1 (en) Wireless system access control method and device
CN109474595B (en) Electronic equipment binding method, electronic equipment, mobile terminal and server
CN111131300B (en) Communication method, terminal and server
CN106559405B (en) Portal authentication method and equipment
EP3320423A1 (en) Authentication method, apparatus, and system
CN109996219B (en) Internet of things authentication method, network equipment and terminal
CN109861999B (en) Data transmission control method, device and storage medium
EP2981022A1 (en) Method and system for transmitting and receiving data, method and device for processing message
CN100388260C (en) Software defined radio download
CN111404695A (en) Token request verification method and device
WO2023109240A1 (en) Smart door lock binding method and apparatus, storage medium and electronic device
CN107508746B (en) Good friend's adding method, device and electronic equipment
EP2557755B1 (en) Securely Performing Commands from a Remote Source
CN112448930A (en) Account registration method, device, server and computer readable storage medium
CN110430572B (en) eUICC card, communication method of eUICC card and management platform and communication system thereof
CN109286665B (en) Real-time mobile game long link processing method and device
CN105553675B (en) Log in the method and device of router
EP3313039A1 (en) Home gateway, communication management method and communication system thereof
CN111918268B (en) Control method and device of intelligent equipment, electronic equipment and storage medium
CN110830420A (en) Method and system for verifying short message verification code
CN112469035B (en) Safe activation and control method and communication system of remote equipment of Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant